Cross-platform threat detection

Add anti-malware capabilities

Whether intended for your organizations’ internal use or for your customers, the SDK easily integrates ESET's scanning engine to fend off all types of threats, including ransomware and zero-day malware.

Complete control

You have full control over the implementation process and which functionality you decide to use. The solution offers a wide range of options, supported with extensive documentation and ESET engineers ready to assist you in case you need help.

Use cases

PROBLEM

How to add value to products and services your organization provides?

Your organization is competing in a tough market and needs to enhance its products, services and solutions.

SOLUTION

Build products with excellent protection within.

Offer products with excellent-quality in-built protection. To gain a head start on your rivals, enhance your products, services and solutions with ESET anti-malware. Depending on the type of product or service your organization provides, choose the ESET Anti-Malware SDK functionality that suits best and offers most value to your customers.

The ESET difference

DNA detections

Detection types range from very specific hashes to ESET DNA Detections, which are complex definitions of malicious behavior and malware characteristics.

While the malicious code can be easily modified or obfuscated by attackers, the behavior of objects cannot be changed so easily and ESET DNA Detections are designed to take advantage of this principle.

In-product sandbox

Today’s malware is often heavily obfuscated and tries to evade detection as much as possible. To see through this and identify the real behavior hidden underneath the surface, we use in-product sandboxing.

With the help of this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualized environment.

Scans files and blocks of data

Analyzes hundreds of different file formats (executables, installers, scripts, archives, documents and bytecodes, as well as blocks of data) in order to accurately detect embedded malicious components.

Stay on top of cybersecurity news

Online safety is one of the most significant challenges facing parents in the modern world. It is increasingly common for children of all ages to have their own phones, with 73% owning a mobile phone...